Automated Verification of Equivalence Properties of Cryptographic Protocols

被引:30
|
作者
Chadha, Rohit [1 ]
Cheval, Vincent [2 ,5 ]
Ciobaca, Stefan [3 ]
Kremer, Steve [4 ,5 ]
机构
[1] Univ Missouri, Dept Comp Sci, 201 Engn Bldg West, Columbia, MO 65203 USA
[2] Univ Kent, Canterbury CT2 7NZ, Kent, England
[3] Alexandru Ioan Cuza Univ, Fac Comp Sci, 16 Gen Berthelot St, Iasi 700483, Romania
[4] Inria Nancy Grand Est, Villers Les Nancy, France
[5] LORIA, Campus Sci,BP 239, F-54506 Vandoeuvre Les Nancy, France
基金
美国国家科学基金会; 欧洲研究理事会;
关键词
Security; Verification; SYMBOLIC BISIMULATION; DECIDING KNOWLEDGE; SECURITY PROTOCOLS; CALCULUS; PRIVACY; TOOL;
D O I
10.1145/2926715
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Indistinguishability properties are essential in formal verification of cryptographic protocols. They are needed to model anonymity properties, strong versions of confidentiality, and resistance against offline guessing attacks. Indistinguishability properties can be conveniently modeled as equivalence properties. We present a novel procedure to verify equivalence properties for a bounded number of sessions of cryptographic protocols. As in the applied pi calculus, our protocol specification language is parametrized by a first-order sorted term signature and an equational theory that allows formalization of algebraic properties of cryptographic primitives. Our procedure is able to verify trace equivalence for determinate cryptographic protocols. On determinate protocols, trace equivalence coincides with observational equivalence, which can therefore be automatically verified for such processes. When protocols are not determinate, our procedure can be used for both under- and over-approximations of trace equivalence, which proved successful on examples. The procedure can handle a large set of cryptographic primitives, namely those whose equational theory is generated by an optimally reducing convergent rewrite system. The procedure is based on a fully abstract modelling of the traces of a bounded number of sessions of the protocols into first-order Horn clauses on which a dedicated resolution procedure is used to decide equivalence properties. We have shown that our procedure terminates for the class of subterm convergent equational theories. Moreover, the procedure has been implemented in a prototype tool Active Knowledge in Security Protocols and has been effectively tested on examples. Some of the examples were outside the scope of existing tools, including checking anonymity of an electronic voting protocol due to Okamoto.
引用
收藏
页数:32
相关论文
共 50 条
  • [1] Automated Verification of Equivalence Properties of Cryptographic Protocols
    Chadha, Rohit
    Ciobaca, Stefan
    Kremer, Steve
    PROGRAMMING LANGUAGES AND SYSTEMS, 2012, 7211 : 108 - 127
  • [2] Automated verification tools for cryptographic protocols
    Hassan, Adel
    Ishaq, Isam
    Minilla, Jorge
    2021 INTERNATIONAL CONFERENCE ON PROMISING ELECTRONIC TECHNOLOGIES (ICPET 2021), 2021, : 58 - 65
  • [3] Equivalence Properties by Typing in Cryptographic Branching Protocols
    Cortier, Veronique
    Grimm, Niklas
    Lallemand, Joseph
    Maffei, Matteo
    PRINCIPLES OF SECURITY AND TRUST, POST 2018, 2018, 10804 : 160 - 187
  • [4] Automated Unbounded Verification of Stateful Cryptographic Protocols with Exclusive OR
    Dreier, Jannik
    Hirschi, Lucca
    Radomirovic, Sasa
    Sasse, Ralf
    IEEE 31ST COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2018), 2018, : 359 - 373
  • [5] Type-Based Automated Verification of Authenticity in Cryptographic Protocols
    Kikuchi, Daisuke
    Kobayashi, Naoki
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2009, 5502 : 222 - 236
  • [6] Semi-automated verification of security proofs of quantum cryptographic protocols
    Kubota, Takahiro
    Kakutani, Yoshihiko
    Kato, Go
    Kawano, Yasuhito
    Sakurada, Hideki
    JOURNAL OF SYMBOLIC COMPUTATION, 2016, 73 : 192 - 220
  • [7] Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols
    Dahl, Morten
    Kobayashi, Naoki
    Sun, Yunde
    Huttel, Hans
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, 2011, 6996 : 75 - +
  • [8] Runtime verification of cryptographic protocols
    Bauer, Andreas
    Juerjens, Jan
    COMPUTERS & SECURITY, 2010, 29 (03) : 315 - 330
  • [9] Verifiable Verification in Cryptographic Protocols
    Fischlin, Marc
    Gunther, Felix
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3239 - 3253
  • [10] Automatic approximation for the verification of cryptographic protocols
    Oehl, F
    Cece, G
    Kouchnarenko, O
    Sinclair, D
    FORMAL ASPECTS OF SECURITY, 2003, 2629 : 33 - 48